SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Getting More from SCCM with Asset Vision:
Top Five Reasons Why Companies Augment SCCM
with Asset Vision® Optimize
A SCALABLE SOFTWARE WHITEPAPER

“Any application
migration
or licensing
planning
exercise based
on SCCM usage
information will
always result in
the migration
or licensing of
applications
that either
aren’t required,
or for which a
more efficient
implementation
is possible.”

Executive Summary
SCCM is one of the most widely deployed configuration management products in use today, but SCCM
can be augmented to great benefit. In this whitepaper, you will learn the primary reasons why companies
augment SCCM with Scalable’s Asset Vision Optimize. By definition, this paper outlines many capabilites
not present in SCCM, but it should not be seen as positioning Asset Vision to replace SCCM. Asset
Vision cannot replace SCCM, since SCCM has many capabilities not present in Asset Vision. Rather, for
organizations evaluating Asset Vision, this document illustrates those areas where Asset Vision can add
considerable value to their SCCM implementation.

Reason 1: The need for automated, real application usage across Windows
desktops and servers
SCCM requires discrete application rule identification in order to track what applications should be
“metered” ahead of time. However, the old saying “you don’t know what you don’t know” makes
this SCCM requirement almost self-defeating, as it creates an issue with application usage tracking.
Applications that are not pre-defined will never be shown as having been used, even if they are used
heavily. This fact is particularly relevant for applications that run in a virtualized environment that leave
no trace on the workstation. In short, SCCM will always under-report the list of applications being
used in any organization, making it impossible to rely on its information for migration planning.
Unlike SCCM, Asset Vision automatically tracks real application usage dynamically with zero
configuration. This dynamic usage tracking occurs independent of where the application is launched
from, and is tracked at a user and machine level.
Further, SCCM usage monitoring only identifies the amount of time the application is run on the
workstation, in contrast to Asset Vision, which measures the amount of time a user is interacting with
any launched application. No information is provided by SCCM as to the amount of time a user
genuinely interacts with the application.
A common usage profile for applications is: they are launched; used once, remain open (possibly for
hours) on the desktop, and are then closed at the end of the day. SCCM usage monitoring would
show this as a heavily used application, whereas Asset Vision would correctly report it as very lightly
used. In consequence, for applications SCCM does identify as being used, SCCM will always overreport the extent to which those applications are used.
The impact of this SCCM usage reporting gap: any application migration or licensing planning exercise
based on SCCM usage information will always result in the migration or licensing of applications that
either aren’t required, or for which a more efficient implementation is possible.

www.scalable.com	

1-866-722-5225 	

sales@scalable.com
An always-on, configuration-free mechanism for metering genuine application usage is the
only way to get a reliable data set upon which to base a variety of decisions. The alternative is
spiral of second guessing the results and continually iterative configuration. Asset Vision will accurately
report real usage of known and unknown applications with zero setup.

“For expensive
and complex
applications the
ratio of readonly usage to
total usage can
be very high...
understanding
which users
fall into which
categories can
help dramatically
reduce ongoing
expenses.”

Reason 2: Full support for the metering of applications regardless of
implementation
Another key reason why people use Asset Vision to augment SCCM: this augmentation enables the
metering of applications whether traditional, web, SaaS, or virtual, capturing the full picture of application
usage in a single place rather than forcing the user to aggregate less accurate information from a variety
of disparate sources.
Asset Vision gathers the same information for applications that work through web browsers, run
on Citrix XenApp or Terminal Services, or are streamed down via an App-V or ThinApp virtualized
application environment, as it does for traditionally installed applications. For web applications, Asset
Vision can identify the precise URL being used and associate it with a friendly name by means of predefined URL patterns. In all cases the usage context gathered is the same. Asset Vision will identify
the user of the application and the endpoint device from which the application is consumed.
In the case of XenApp or Terminal Services, this capability is achieved by means of a version of the
Asset Vision agent that runs on the XenApp or Terminal Services server. For XenApp or Terminal
Services applications, additional concurrent use analysis is possible. These reports raise awareness of
any potential capacity or licensing issues as a result of higher levels of concurrent use.
For companies using SCCM without Asset Vision, getting this complete and accurate a picture of
usage would take an order of magnitude more time, and the resulting information would still be
inaccurate and incomplete for the reasons noted earlier.

Reason 3: Identification of read-only use of applications
The ability to distinguish between usage that is read-only in nature and full read/write activity is entirely
absent within SCCM. Asset Vision can fill this gap.
For expensive and complex applications the ratio of read-only usage to total usage can be very high.
When considering licensing costs or migration issues, understanding which users fall into which
categories can dramatically reduce ongoing expenses. Often solutions for read-only usage requirements
are more cost-effective, give greater end-user satisfaction, and are easier to migrate and maintain.
Further, any progressive organization will want to identify its constituency of read-only users for each
of its main applications to improve the service it provides its end-users. All this can be enabled by
augmenting SCCM with Asset Vision.

Reason 4: Automated matching of run-time components to installed packages
Asset Vision further augments SCCM through its unique capability to dynamically identify which
installed package a particular run-time component is part of. This unique capability makes it possible to
unequivocally identify a run-time component as an artifact of a particular package installation.
This matching does not require any form of catalog; it is achieved using an algorithm Scalable invented.
This algorithm enables a very clear relationship to be made between the running processes on the
workstation and installed software packages. It will work on packages installed using both MSI and nonMSI methods.
www.scalable.com	

1-866-722-5225 	

sales@scalable.com	

2
Reason 5: Application data object and dialog usage
Asset Vision features a usage capability that captures detailed usage at a read/write level on data
objects and dialogs, providing a powerful extension of SCCM capabilities. A data object in this context
could be a Word or Excel document, a project file, a development project, or anything identified in the
caption zone on an individual window. With Asset Vision, it is possible to see the extent to which any
particular object is used by a defined group of users.

“[Asset Vision]
lowered ongoing
maintenance
and support
costs and
improved the
performance
of the
environment.”

The benefits of this feature are considerable for a data rationalization or migration project. Case in
point: in one organization, Asset Vision identified a large group of individuals that were regularly sharing
the same Microsoft Access database. Early identification by Asset Vision enabled the organization to
rapidly migrate the data onto a SQL Express platform. This lowered ongoing maintenance and support
costs and improved the performance of the environment, profoundly and positively affecting the service
delivered to that group of end users.
The dialog usage metering capability of Asset Vision enables tracking of those application sub-functions
that do not exist independently of the main application but have a discrete licensing, maintenance or
migration impact. Common uses for this feature include the ability to determine whether a group of
users requires all licensed market data feeds, or whether certain communities of users require training
on newly deployed or existing application sub-functions.
The ability to identify the object or dialog being referenced within an application presents
meaningful opportunities for cost reduction and efficiency improvements. These opportunities
are particularly relevant for high-value applications with granular licensing models, and in
situations where expensive plug-ins are widely deployed.

Additional features relevant to the discussion
SCCM Native Integration
Asset Vision integrates directly with SCCM through a natively supported integration interface. This
integration piece completes the workflow between removal/redeployment of underutilized applications
and SCCM’s package management capability. Ultimately, SCCM administrators can save days by using
Asset Vision as the intelligence tool to drive SCCM software management policies.
Intelligent Software Application Catalog
Through a variety of mechanisms, including heuristic processes and crowd-sourcing, we are able to
keep the catalog of over 100,000 titles current. The impact of this to an organization is an unrivalled
ability to identify and categorize almost any inventoried software package generally available.
Plug-In Detection
Asset Vision can identify plug-ins installed alongside main applications. The existence of plug-ins can
impact migration and licensing.
License Key and ISO 19770-2 Tag Retrieval
Asset Vision is able to retrieve license keys from remote workstations for all Microsoft and Adobe
products. These keys can be stored and/or used for subsequent installations. Scalable adds support
for additional vendors products as market demands dictate. In addition Asset Vision can retrieve
Software ID Tags. These tags, which are gradually being adopted by many of the larger software
publishers, are a way in which the existence and licensing state of a particular licensable product can
be unequivocally established.

www.scalable.com	

1-866-722-5225 	

sales@scalable.com	

3
Printer Usage Analysis
Asset Vision contains a wealth of information relating to local and network printer utilization. Using this
data it is possible to identify print inefficiencies by easily spotting usage anomalies on printers with
high consumable costs. Asset Vision users have reduced their printer-to-employee ratio from
one printer for every two employees to one printer for every 13 employees with no reduction in
service to the employees. This is also important for virtualized environments such as XenApp or a
VDI implementation. The fewer peripherals required, the less network bandwidth and support effort are
needed, driving down the cost of Terminal Services and VDI adoption.

Summary
Asset Vision can add considerable value to a SCCM implementation. Asset Vision extends the inventory
and configuration management features of SCCM with forensic-level usage metering. The scope
and depth of this metering enhances decision making for cost reduction, migration, and licensing
in ways heretofore impossible. Organizations with a commitment to the automation of configuration
management as indicated by the use of SCCM will immediately benefit from the additional level of
intelligence provided by the state-of-the-art usage metering delivered by Asset Vision.
Learn more about Scalable’s Asset Vision at www.scalable.com/sccm-augment, or email us to
request a demo at sales@scalable.com.

About Scalable
Scalable Software, an innovator in IT Asset Management software since 1999, publishes the WinINSTALL suite of products and is the
company behind Asset Vision®, a unified Cloud-based ITAM tool. Asset Vision drives expense out of IT, slashing the cost of administering,
supporting, and updating traditional on-premise ITAM solutions. Asset Vision’s agentless discovery easily populates, reconciles, and
normalizes IT assets. Along with its comprehensive Software Asset Management layer, it swiftly enables accurate compliance reporting,
reduces waste through application usage analytics, and precisely identifies unused software and features on all types of devices, even in
BYOD scenarios. For more information: www.scalable.com or info@scalable.com.
© 2013 Scalable Software, Inc. All rights reserved. Scalable, the Scalable logo, Asset Vision, WinINSTALL, and Scalable LIVE!
2013WP00709
are registered trademarks of Scalable Software, Inc. All other marks are the property of their respective owners.

www.scalable.com	

1-866-722-5225 	

sales@scalable.com	

4

Weitere ähnliche Inhalte

Was ist angesagt?

Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyijcseit
 
Algorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in CloudAlgorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in CloudIRJET Journal
 
Azure. Is It Worth It? - TechEd Beijing 2010 - Ethos
Azure. Is It Worth It? - TechEd Beijing 2010 - EthosAzure. Is It Worth It? - TechEd Beijing 2010 - Ethos
Azure. Is It Worth It? - TechEd Beijing 2010 - EthosEthos Technologies
 
Flexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing IJCSIS Research Publications
 
IRJET- Cloud Based Warehouse Management Firm
IRJET- Cloud Based Warehouse Management FirmIRJET- Cloud Based Warehouse Management Firm
IRJET- Cloud Based Warehouse Management FirmIRJET Journal
 
Application management for hybrid cloud
Application management for hybrid cloudApplication management for hybrid cloud
Application management for hybrid cloudVMware vFabric
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem Jade Global
 
An Introduction to SaaS and Cloud Computing
An Introduction toSaaS and Cloud ComputingAn Introduction toSaaS and Cloud Computing
An Introduction to SaaS and Cloud Computingelliando dias
 
Comprehensive Information on Software as a Service
Comprehensive Information on Software as a ServiceComprehensive Information on Software as a Service
Comprehensive Information on Software as a ServiceHTS Hosting
 
Defense Ready Overview 10 09
Defense Ready   Overview   10 09Defense Ready   Overview   10 09
Defense Ready Overview 10 09dave_milton
 
Virtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmpVirtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmpVishal Deshpande
 

Was ist angesagt? (17)

IJET-V2I6P19
IJET-V2I6P19IJET-V2I6P19
IJET-V2I6P19
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancy
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Algorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in CloudAlgorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in Cloud
 
Azure. Is It Worth It? - TechEd Beijing 2010 - Ethos
Azure. Is It Worth It? - TechEd Beijing 2010 - EthosAzure. Is It Worth It? - TechEd Beijing 2010 - Ethos
Azure. Is It Worth It? - TechEd Beijing 2010 - Ethos
 
Flexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera Software App Portal Datasheet
Flexera Software App Portal Datasheet
 
Software as a Service
Software as a ServiceSoftware as a Service
Software as a Service
 
Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing Dynamic Service Level Agreement Verification in Cloud Computing
Dynamic Service Level Agreement Verification in Cloud Computing
 
Platform As A Service
Platform As A ServicePlatform As A Service
Platform As A Service
 
IRJET- Cloud Based Warehouse Management Firm
IRJET- Cloud Based Warehouse Management FirmIRJET- Cloud Based Warehouse Management Firm
IRJET- Cloud Based Warehouse Management Firm
 
Application management for hybrid cloud
Application management for hybrid cloudApplication management for hybrid cloud
Application management for hybrid cloud
 
AW2016_v01
AW2016_v01AW2016_v01
AW2016_v01
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem
 
An Introduction to SaaS and Cloud Computing
An Introduction toSaaS and Cloud ComputingAn Introduction toSaaS and Cloud Computing
An Introduction to SaaS and Cloud Computing
 
Comprehensive Information on Software as a Service
Comprehensive Information on Software as a ServiceComprehensive Information on Software as a Service
Comprehensive Information on Software as a Service
 
Defense Ready Overview 10 09
Defense Ready   Overview   10 09Defense Ready   Overview   10 09
Defense Ready Overview 10 09
 
Virtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmpVirtual clustered-multiprocessing-vcmp
Virtual clustered-multiprocessing-vcmp
 

Andere mochten auch

AllerganSCCMfailure
AllerganSCCMfailureAllerganSCCMfailure
AllerganSCCMfailureMatt R
 
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...Concentrated Technology
 
App v overview
App v overviewApp v overview
App v overviewEdmund Lim
 
Akhil_Vrmani_HCL_SCCM
Akhil_Vrmani_HCL_SCCMAkhil_Vrmani_HCL_SCCM
Akhil_Vrmani_HCL_SCCMAkhil Virmani
 
Prashanth_Mallampally_(SCCM resume)[1]
Prashanth_Mallampally_(SCCM resume)[1]Prashanth_Mallampally_(SCCM resume)[1]
Prashanth_Mallampally_(SCCM resume)[1]Prashanth Mallampally
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMJerry Bishop
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
Arun SCCM Profile
Arun SCCM Profile Arun SCCM Profile
Arun SCCM Profile Arun M
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 

Andere mochten auch (9)

AllerganSCCMfailure
AllerganSCCMfailureAllerganSCCMfailure
AllerganSCCMfailure
 
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
 
App v overview
App v overviewApp v overview
App v overview
 
Akhil_Vrmani_HCL_SCCM
Akhil_Vrmani_HCL_SCCMAkhil_Vrmani_HCL_SCCM
Akhil_Vrmani_HCL_SCCM
 
Prashanth_Mallampally_(SCCM resume)[1]
Prashanth_Mallampally_(SCCM resume)[1]Prashanth_Mallampally_(SCCM resume)[1]
Prashanth_Mallampally_(SCCM resume)[1]
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
Arun SCCM Profile
Arun SCCM Profile Arun SCCM Profile
Arun SCCM Profile
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 

Ähnlich wie Getting More from SCCM

Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringConvetit
 
Accelerating Time-to-Value Through Hybrid Cloud Automation
Accelerating Time-to-Value Through Hybrid Cloud AutomationAccelerating Time-to-Value Through Hybrid Cloud Automation
Accelerating Time-to-Value Through Hybrid Cloud AutomationCognizant
 
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...riyak40
 
Making Multicloud Application Integration More Efficient
Making Multicloud Application Integration More EfficientMaking Multicloud Application Integration More Efficient
Making Multicloud Application Integration More EfficientCognizant
 
78425589-Cloud-Optimization-Whitepaper.pdf
78425589-Cloud-Optimization-Whitepaper.pdf78425589-Cloud-Optimization-Whitepaper.pdf
78425589-Cloud-Optimization-Whitepaper.pdfJay Kulkarni
 
Understanding the Anametrix Cloud-based Analytics Platform
Understanding the Anametrix Cloud-based Analytics PlatformUnderstanding the Anametrix Cloud-based Analytics Platform
Understanding the Anametrix Cloud-based Analytics PlatformAnametrix
 
How an Integrated Cloud Management Platform Cuts Costs While Increasing Agility
How an Integrated Cloud Management Platform Cuts Costs While Increasing AgilityHow an Integrated Cloud Management Platform Cuts Costs While Increasing Agility
How an Integrated Cloud Management Platform Cuts Costs While Increasing AgilityCognizant
 
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based WorkflowLarry Suarez
 
Scalr Solution Overview
Scalr Solution OverviewScalr Solution Overview
Scalr Solution OverviewScalr
 
Cloud MicroService Architecture
Cloud MicroService ArchitectureCloud MicroService Architecture
Cloud MicroService ArchitectureYakov Liskoff
 
Software Asset Management Datasheet
Software Asset Management DatasheetSoftware Asset Management Datasheet
Software Asset Management DatasheetJade Global
 
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...Swatantra Kumar
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comArun Somu Panneerselvam
 
How to Build a Scalable Web Application for Your Project
How to Build a Scalable Web Application for Your ProjectHow to Build a Scalable Web Application for Your Project
How to Build a Scalable Web Application for Your ProjectBitCot
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfAgaram Technologies
 

Ähnlich wie Getting More from SCCM (20)

Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 
Accelerating Time-to-Value Through Hybrid Cloud Automation
Accelerating Time-to-Value Through Hybrid Cloud AutomationAccelerating Time-to-Value Through Hybrid Cloud Automation
Accelerating Time-to-Value Through Hybrid Cloud Automation
 
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
 
Making Multicloud Application Integration More Efficient
Making Multicloud Application Integration More EfficientMaking Multicloud Application Integration More Efficient
Making Multicloud Application Integration More Efficient
 
78425589-Cloud-Optimization-Whitepaper.pdf
78425589-Cloud-Optimization-Whitepaper.pdf78425589-Cloud-Optimization-Whitepaper.pdf
78425589-Cloud-Optimization-Whitepaper.pdf
 
Asp
AspAsp
Asp
 
Understanding the Anametrix Cloud-based Analytics Platform
Understanding the Anametrix Cloud-based Analytics PlatformUnderstanding the Anametrix Cloud-based Analytics Platform
Understanding the Anametrix Cloud-based Analytics Platform
 
How an Integrated Cloud Management Platform Cuts Costs While Increasing Agility
How an Integrated Cloud Management Platform Cuts Costs While Increasing AgilityHow an Integrated Cloud Management Platform Cuts Costs While Increasing Agility
How an Integrated Cloud Management Platform Cuts Costs While Increasing Agility
 
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based Workflow
 
Scalr Solution Overview
Scalr Solution OverviewScalr Solution Overview
Scalr Solution Overview
 
Cloud MicroService Architecture
Cloud MicroService ArchitectureCloud MicroService Architecture
Cloud MicroService Architecture
 
Software Asset Management Datasheet
Software Asset Management DatasheetSoftware Asset Management Datasheet
Software Asset Management Datasheet
 
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
Why not let apm do all the heavy lifting beyond the basics of monitoring | Sw...
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 
How to Build a Scalable Web Application for Your Project
How to Build a Scalable Web Application for Your ProjectHow to Build a Scalable Web Application for Your Project
How to Build a Scalable Web Application for Your Project
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
T01821125128
T01821125128T01821125128
T01821125128
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
M 94 4
M 94 4M 94 4
M 94 4
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Getting More from SCCM

  • 1. Getting More from SCCM with Asset Vision: Top Five Reasons Why Companies Augment SCCM with Asset Vision® Optimize A SCALABLE SOFTWARE WHITEPAPER “Any application migration or licensing planning exercise based on SCCM usage information will always result in the migration or licensing of applications that either aren’t required, or for which a more efficient implementation is possible.” Executive Summary SCCM is one of the most widely deployed configuration management products in use today, but SCCM can be augmented to great benefit. In this whitepaper, you will learn the primary reasons why companies augment SCCM with Scalable’s Asset Vision Optimize. By definition, this paper outlines many capabilites not present in SCCM, but it should not be seen as positioning Asset Vision to replace SCCM. Asset Vision cannot replace SCCM, since SCCM has many capabilities not present in Asset Vision. Rather, for organizations evaluating Asset Vision, this document illustrates those areas where Asset Vision can add considerable value to their SCCM implementation. Reason 1: The need for automated, real application usage across Windows desktops and servers SCCM requires discrete application rule identification in order to track what applications should be “metered” ahead of time. However, the old saying “you don’t know what you don’t know” makes this SCCM requirement almost self-defeating, as it creates an issue with application usage tracking. Applications that are not pre-defined will never be shown as having been used, even if they are used heavily. This fact is particularly relevant for applications that run in a virtualized environment that leave no trace on the workstation. In short, SCCM will always under-report the list of applications being used in any organization, making it impossible to rely on its information for migration planning. Unlike SCCM, Asset Vision automatically tracks real application usage dynamically with zero configuration. This dynamic usage tracking occurs independent of where the application is launched from, and is tracked at a user and machine level. Further, SCCM usage monitoring only identifies the amount of time the application is run on the workstation, in contrast to Asset Vision, which measures the amount of time a user is interacting with any launched application. No information is provided by SCCM as to the amount of time a user genuinely interacts with the application. A common usage profile for applications is: they are launched; used once, remain open (possibly for hours) on the desktop, and are then closed at the end of the day. SCCM usage monitoring would show this as a heavily used application, whereas Asset Vision would correctly report it as very lightly used. In consequence, for applications SCCM does identify as being used, SCCM will always overreport the extent to which those applications are used. The impact of this SCCM usage reporting gap: any application migration or licensing planning exercise based on SCCM usage information will always result in the migration or licensing of applications that either aren’t required, or for which a more efficient implementation is possible. www.scalable.com 1-866-722-5225 sales@scalable.com
  • 2. An always-on, configuration-free mechanism for metering genuine application usage is the only way to get a reliable data set upon which to base a variety of decisions. The alternative is spiral of second guessing the results and continually iterative configuration. Asset Vision will accurately report real usage of known and unknown applications with zero setup. “For expensive and complex applications the ratio of readonly usage to total usage can be very high... understanding which users fall into which categories can help dramatically reduce ongoing expenses.” Reason 2: Full support for the metering of applications regardless of implementation Another key reason why people use Asset Vision to augment SCCM: this augmentation enables the metering of applications whether traditional, web, SaaS, or virtual, capturing the full picture of application usage in a single place rather than forcing the user to aggregate less accurate information from a variety of disparate sources. Asset Vision gathers the same information for applications that work through web browsers, run on Citrix XenApp or Terminal Services, or are streamed down via an App-V or ThinApp virtualized application environment, as it does for traditionally installed applications. For web applications, Asset Vision can identify the precise URL being used and associate it with a friendly name by means of predefined URL patterns. In all cases the usage context gathered is the same. Asset Vision will identify the user of the application and the endpoint device from which the application is consumed. In the case of XenApp or Terminal Services, this capability is achieved by means of a version of the Asset Vision agent that runs on the XenApp or Terminal Services server. For XenApp or Terminal Services applications, additional concurrent use analysis is possible. These reports raise awareness of any potential capacity or licensing issues as a result of higher levels of concurrent use. For companies using SCCM without Asset Vision, getting this complete and accurate a picture of usage would take an order of magnitude more time, and the resulting information would still be inaccurate and incomplete for the reasons noted earlier. Reason 3: Identification of read-only use of applications The ability to distinguish between usage that is read-only in nature and full read/write activity is entirely absent within SCCM. Asset Vision can fill this gap. For expensive and complex applications the ratio of read-only usage to total usage can be very high. When considering licensing costs or migration issues, understanding which users fall into which categories can dramatically reduce ongoing expenses. Often solutions for read-only usage requirements are more cost-effective, give greater end-user satisfaction, and are easier to migrate and maintain. Further, any progressive organization will want to identify its constituency of read-only users for each of its main applications to improve the service it provides its end-users. All this can be enabled by augmenting SCCM with Asset Vision. Reason 4: Automated matching of run-time components to installed packages Asset Vision further augments SCCM through its unique capability to dynamically identify which installed package a particular run-time component is part of. This unique capability makes it possible to unequivocally identify a run-time component as an artifact of a particular package installation. This matching does not require any form of catalog; it is achieved using an algorithm Scalable invented. This algorithm enables a very clear relationship to be made between the running processes on the workstation and installed software packages. It will work on packages installed using both MSI and nonMSI methods. www.scalable.com 1-866-722-5225 sales@scalable.com 2
  • 3. Reason 5: Application data object and dialog usage Asset Vision features a usage capability that captures detailed usage at a read/write level on data objects and dialogs, providing a powerful extension of SCCM capabilities. A data object in this context could be a Word or Excel document, a project file, a development project, or anything identified in the caption zone on an individual window. With Asset Vision, it is possible to see the extent to which any particular object is used by a defined group of users. “[Asset Vision] lowered ongoing maintenance and support costs and improved the performance of the environment.” The benefits of this feature are considerable for a data rationalization or migration project. Case in point: in one organization, Asset Vision identified a large group of individuals that were regularly sharing the same Microsoft Access database. Early identification by Asset Vision enabled the organization to rapidly migrate the data onto a SQL Express platform. This lowered ongoing maintenance and support costs and improved the performance of the environment, profoundly and positively affecting the service delivered to that group of end users. The dialog usage metering capability of Asset Vision enables tracking of those application sub-functions that do not exist independently of the main application but have a discrete licensing, maintenance or migration impact. Common uses for this feature include the ability to determine whether a group of users requires all licensed market data feeds, or whether certain communities of users require training on newly deployed or existing application sub-functions. The ability to identify the object or dialog being referenced within an application presents meaningful opportunities for cost reduction and efficiency improvements. These opportunities are particularly relevant for high-value applications with granular licensing models, and in situations where expensive plug-ins are widely deployed. Additional features relevant to the discussion SCCM Native Integration Asset Vision integrates directly with SCCM through a natively supported integration interface. This integration piece completes the workflow between removal/redeployment of underutilized applications and SCCM’s package management capability. Ultimately, SCCM administrators can save days by using Asset Vision as the intelligence tool to drive SCCM software management policies. Intelligent Software Application Catalog Through a variety of mechanisms, including heuristic processes and crowd-sourcing, we are able to keep the catalog of over 100,000 titles current. The impact of this to an organization is an unrivalled ability to identify and categorize almost any inventoried software package generally available. Plug-In Detection Asset Vision can identify plug-ins installed alongside main applications. The existence of plug-ins can impact migration and licensing. License Key and ISO 19770-2 Tag Retrieval Asset Vision is able to retrieve license keys from remote workstations for all Microsoft and Adobe products. These keys can be stored and/or used for subsequent installations. Scalable adds support for additional vendors products as market demands dictate. In addition Asset Vision can retrieve Software ID Tags. These tags, which are gradually being adopted by many of the larger software publishers, are a way in which the existence and licensing state of a particular licensable product can be unequivocally established. www.scalable.com 1-866-722-5225 sales@scalable.com 3
  • 4. Printer Usage Analysis Asset Vision contains a wealth of information relating to local and network printer utilization. Using this data it is possible to identify print inefficiencies by easily spotting usage anomalies on printers with high consumable costs. Asset Vision users have reduced their printer-to-employee ratio from one printer for every two employees to one printer for every 13 employees with no reduction in service to the employees. This is also important for virtualized environments such as XenApp or a VDI implementation. The fewer peripherals required, the less network bandwidth and support effort are needed, driving down the cost of Terminal Services and VDI adoption. Summary Asset Vision can add considerable value to a SCCM implementation. Asset Vision extends the inventory and configuration management features of SCCM with forensic-level usage metering. The scope and depth of this metering enhances decision making for cost reduction, migration, and licensing in ways heretofore impossible. Organizations with a commitment to the automation of configuration management as indicated by the use of SCCM will immediately benefit from the additional level of intelligence provided by the state-of-the-art usage metering delivered by Asset Vision. Learn more about Scalable’s Asset Vision at www.scalable.com/sccm-augment, or email us to request a demo at sales@scalable.com. About Scalable Scalable Software, an innovator in IT Asset Management software since 1999, publishes the WinINSTALL suite of products and is the company behind Asset Vision®, a unified Cloud-based ITAM tool. Asset Vision drives expense out of IT, slashing the cost of administering, supporting, and updating traditional on-premise ITAM solutions. Asset Vision’s agentless discovery easily populates, reconciles, and normalizes IT assets. Along with its comprehensive Software Asset Management layer, it swiftly enables accurate compliance reporting, reduces waste through application usage analytics, and precisely identifies unused software and features on all types of devices, even in BYOD scenarios. For more information: www.scalable.com or info@scalable.com. © 2013 Scalable Software, Inc. All rights reserved. Scalable, the Scalable logo, Asset Vision, WinINSTALL, and Scalable LIVE! 2013WP00709 are registered trademarks of Scalable Software, Inc. All other marks are the property of their respective owners. www.scalable.com 1-866-722-5225 sales@scalable.com 4